Connected Cars and Security Design Considerations


Digital Disruptions is changing the way car business is done. The global automotive market is more than 100-years-old and generates over $9 trillion of revenue annually, yet the industry has seen very few major advancements since the early years. During the past century, vehicle fundamentals, including functionality, features and overall system design, have remained relatively... Continue Reading →

Advertisements

Strategic Plan for Cyber Security Education


Governments understands the importance of cyber security for nation's skill building and developing plans. In USA; The President’s Cybersecurity National Action Plan (CNAP) calls for the development of a Cybersecurity Core Curriculum that will ensure cybersecurity graduates who wish to join the Federal Government have the requisite knowledge and skills. The execution of this tasking... Continue Reading →

CEO’s guide to ensure compliance with GDPR


Overview of the GDPR The General Data Protection Regulation (GDPR) imposes new rules on organizations that offer goods and services to people in the European Union (EU), or that collect and analyze data tied to EU residents, no matter where they are located. In May 2018, a European privacy law is due to take effect... Continue Reading →

MSSP’s strategy to monetize from IoT & 5G


MSSP - Introduction An MSSP (managed security service provider) offers cost savings by allowing an organization to outsource its security functions. MSSP provides an organization with some amount of network security management which includes UTM, threat protection, URL filtering Virus/ Spam blocking, firewalls, and virtual private network (VPN) management. Apart from Perimeter level security handling... Continue Reading →

Compliance frameworks for cloud security providers across globe


Many organisations have moved some or all of their IT to the cloud, but it’s resulted in unexpected costs, fragmentation, and a need for more security staff to monitor data, mitigate advanced threats and meet regulatory & compliance requirements. Until few years ago - the mission critical data of an organization will be within walls (data... Continue Reading →

Security considerations while migrating business applications to cloud infrastructure


Cloud Computing has emerged as an effective alternative to organization-based information systems. In the traditional approach, companies invested in the hardware and software and created their own Information Systems departments. Over a decade, this technology has matured quite a bit and many new cloud service providers have emerged. Among these cloud service providers the leaders are... Continue Reading →

Blog at WordPress.com.

Up ↑

%d bloggers like this: